lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 Feb 2012 09:06:55 +0530 From: Ajeet Yadav <ajeet.yadav.77@...il.com> To: Russell King <linux@....linux.org.uk>, Jon Medhurst <tixy@...t.co.uk>, Nicolas Pitre <nicolas.pitre@...aro.org>, Catalin Marinas <catalin.marinas@....com>, Sumit Bhattacharya <sumitb@...dia.com>, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org Cc: Ajeet Yadav <ajeet.yadav.77@...il.com> Subject: [PATCH] ARM: dma-mapping: Fix the type used for consistent_pte size calculation To be consistent with declaration and usage of consistent_pte, it needs to be an array of (pte *) Signed-off-by: Ajeet Yadav <ajeet.yadav.77@...il.com> --- arch/arm/mm/dma-mapping.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/arm/mm/dma-mapping.c b/arch/arm/mm/dma-mapping.c index 1aa664a..04bfa76 100644 --- a/arch/arm/mm/dma-mapping.c +++ b/arch/arm/mm/dma-mapping.c @@ -170,7 +170,7 @@ static int __init consistent_init(void) unsigned long base = consistent_base; unsigned long num_ptes = (CONSISTENT_END - base) >> PMD_SHIFT; - consistent_pte = kmalloc(num_ptes * sizeof(pte_t), GFP_KERNEL); + consistent_pte = kmalloc(num_ptes * sizeof(pte_t *), GFP_KERNEL); if (!consistent_pte) { pr_err("%s: no memory\n", __func__); return -ENOMEM; -- 1.7.8.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists